Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
0c0b546f4f1568051a2d4975d9f141b0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c0b546f4f1568051a2d4975d9f141b0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0c0b546f4f1568051a2d4975d9f141b0_JaffaCakes118.html
-
Size
254B
-
MD5
0c0b546f4f1568051a2d4975d9f141b0
-
SHA1
2eb46d7463458744dd58c8ed105cb12b62c6f3ef
-
SHA256
8688cc024715d61f7f8a3fdc19b8aaaecf1f86fa65de055138dda172b3849fde
-
SHA512
a9edd7287952b8959bf6717e5da194b38e3c4a7d0727a5c719150dab6f7c4e9986aa32255f3ec19fd8995706379d93be22d41a2c9afd71875a6d0596c9bf8f76
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ded80fa7c6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B4B0F71-329A-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006762d053e34d2e7cbc12182e760c7ffc65dc933612508e9ce28da02706cb6152000000000e80000000020000200000000e83fe3070d01110ec7fe0f95d8709912751a399c5b7254bbbaa173c2e04e2792000000099ed7043cd550739379d122829e5cd2f20a1aac267f5de6b69d8637c1ee5faff40000000b12dc2fb263ad0043acbc7d9672e5ab60387e9db601f1e4d76c494baeec7f9643ec3f08c1f6fa2e0260a3187b011c1cc7f6016c299c8efca32386132cf53f7e4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425444214" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2140 2420 iexplore.exe 28 PID 2420 wrote to memory of 2140 2420 iexplore.exe 28 PID 2420 wrote to memory of 2140 2420 iexplore.exe 28 PID 2420 wrote to memory of 2140 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c0b546f4f1568051a2d4975d9f141b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556729768cb527506f77e18be5d7da66e
SHA14e91af96bc17db1ea02829e53a20a62167027a76
SHA2562e6592c29961b8d6c32e4ea1d4f56bcbbdf7a0af41dd925cc87dbf2be7443ec2
SHA512666b8f5884e6500b47a503dcde8ce44c3726b509e9775b73445aa8124e9b4a72eabbe0389d1c03b01895dc561e1b508fc7165240f5f897776932f352cf246593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f82febeee9666d8f762fa1b282c6917
SHA10a4485d8d9817ec883dfe1e88a3b8119096680db
SHA25670c5c7197f2317aa8a663a40ea1f9941a7c3d9c58a6c034d084b76b0e2840587
SHA512d1db702a858edae6bbf08531e7fda8be909037507937e998dbb6bf4ce0aa10364f4ddd99d3005b57ecf607c92a84477c8e4084638a3e438a32ed86572285760b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480202f52e0adf4a894247423dbde073
SHA116a282c059613d08d58bcc23099b3f69e206008c
SHA256a6671f523ff55a49a61ced33403289ece952e95d637e29a7d399368b771f6879
SHA5121d64e3bce1e2441d61b5c99184c46276cee72201268c5112bba180e47bba465dc76dbd0475a31eadb060469a648f81c6647d4261dc1cbfc59d58d66a93bb146f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b059903936d80cc2acc430cbc442cf
SHA1d89f5c84a061a30b7ccaaba6a31ac694eb2bab8c
SHA25620d2c615417810dc3af91ace976e09bb431ad11c591dc7208c2cfd0f3fa587ef
SHA51291417e1021da292f96fb44a743da6647f75011abd179950086a331ea379249e7b46e7ca3bf6ba6be07ae416cc31e1df79e596c5f96fa20afa00728af50aea51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e7a08619ef95560f9cd41e05f67bfa
SHA1826ccea9fbd897104b73b066ae240f8cc3430e2d
SHA25651b3015ab04f4166b86ebf5905a961302ea3b5f7f2f36db72cd87a82afcebda2
SHA51268ef061479678a4bcaae97a78e34bfe00ab1dc1397253026567fb0cfb93b37038f90a6f3245eed6798804c1861ad4fd0069302d091c5426fc55a0bb9bbc26a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044414b9e17a6a78790301a656e563cb
SHA17262561afc67761ff6d3dd90be7ca517340ab43f
SHA256728200eabde24f8418f10773cd0712c36478a468fa53f81d0c1f7ae1d9d9b97b
SHA51257d99cb8506a839baf4bd7b2c3c21c6348e5098c8654448b2327c20df116e7c2adcc0bd6c0c3a605da80b5896c81ff9a1502af40d1f77632653c21f35f4bb886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e1b44ae928e26c545db3dc68f23986
SHA1f6a767441cf38e98d76d66cbd24e5d7f4bdd51d4
SHA2564f34e446ff0d229fd665985f9f99516106e666645b4820c682db56923042110b
SHA5125727f413e2d52b6c3a4b85dc4a5772fd0ef8ed5dcf38ab3e4f17f82ac3fce30daa012a4027f30e89f0dc1dbe8c3030a7e9f29e7bba9ab76ef75330529d5b181a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce649cf83bf695ae77af360ab51f7e29
SHA12cae89e17604e81f8dfd29977a9ebdad6959fd9e
SHA256c58b35e6353b9ddb24ed59f22a3f4c57b4a74646a1f0c261448eae9867b43bc7
SHA512c9a5435a8cc917dd3d664691757b0f042109c5949dcb34ef120fedfc0d3819b84f4a2ef19e0afa5d73f8959718f819ea3828a4ce216c588a086963881979dd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03523fce39d129fc8c74a45967bc95c
SHA12d45ebad488e815c99075047ed622d681a920c8a
SHA25633f5cc91e345b642f862e4464306188312df24205b3686c79f0b47c610d4f68d
SHA512806986902a88c3810b68f50fe07e77b923f1ba006b432860f9526e4d15030c51199f40ad8cf01457e93451cdf0980362f74875815e142ea740a371427c729828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abccdbdcd67bb305e1a2e6b390e1e46a
SHA13dbeb787851720883a553673ecbf87fed1e2c1ba
SHA256a1899fb608ae8f55470b01e56f90652e7ddbd66e6841385ea89b81053274bd0f
SHA512c40f850b92412ab3ba72403c6a6cd9464b5dd1992cfaa7c4e21f4d304a79728d7dec0a424bea549f889b3e6e00790eb00e366d2e00b33a5660ed755b722499f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516cf586c415f2685297405dad0c3cfa0
SHA1325edd6fca06cacae96f63ed9bd4f7a8a61a00b8
SHA256b66905a66a2eb87a80ce4637b425765b02a6f4d86234a5bc26379c27eef2f3f2
SHA512c06bea3b97b63a7ed8c0827e0003eed3808506a5e9a0266f881fe4e5461c717dfe146f122025c40d3aa9235014d3a1cd73cf6c45480b421a0eb656eb73cd89e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab247baccc4027d3d066a623d8f38a0
SHA15aac15d7f27eda58d3f5f9b4ef50846c90dd1a44
SHA256b50556fbe5faaecc26b47add75f806e8bfeea26fb9f3133d732e6859c424aeed
SHA512c94c804217a79a90c16b29b970f49beec467d8c33bc811384c4ea2af5670fcc85d4f0b62081cbc60bd09f83d108899aa97be027747e6da460c4f200ea53ff7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a26347d31c78d2cc8e187c1013762f1
SHA141a207204622ce6319ca96991bc791da241c484f
SHA256a36dfc60d3d07862e494f43a017b1527ede17c5d85660348facabef4c977415d
SHA51276ce97cb276786fb1ce5c6269075d4fc6d5e65027270c2c324c850a650ae24976df3b825f0f6b3ae0716e18d4f30cbefa62284cb02b8b9d6a8755d7db401319b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60192f3855ec8da63cde587c3fc3012
SHA1155d3e2c128a1d43d163ec1a1a5b9eafeaa872ae
SHA256333c18dd3964acffd923a9578ace570fb5c7a03844e013b5139812137c7c5557
SHA5120b8863c41fc71735df32aa980f94587cdf7472655b530e18bfc6552d3cce28bbdaa12bf3790ec3c36af30bb5a3c3162d66fc3a71386b092c1a8cd46c9e1de8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a310f5055878e1bf492939ef479d44b0
SHA19f866038bed52aaa3e5a87dca8d310d50872f63c
SHA2560607e391066d596147aa7a455bf2b929f45557b688b704eff15e0e4c23e9585c
SHA512daf4f70d672e9ac2dccd65cc86f8c24a181cd1bb93a1fff7810f938ac03dd9aab1acecd3ea0977ddc9fd3f4ab25be1cabbe9e94fce6b16195b594ce6d589587f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e64c80e3d475291c084a7d842b0a322
SHA18d9b6e084a062f693b2d1ba7021ceda342f3fad9
SHA256a430e081011342670aa2086d2a5a2458d07de47862af9ce94cee50e232a63f01
SHA512ea1504d66a3728546eac9933df4c669905a754d68e837ba7c546c181976644fad5db14b88932d011ceb67a99b3a1b18fbef839015f78be53cccb02b67e163869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52370ff1eeae313e7e5dc74ed5d63b309
SHA1c8f02175d46d38b273f8d13d15cef60487ec4f79
SHA25660b251a9d11799dfe61b463de8de8107b1e269d46a25b9521fc4d662dad9d7f1
SHA51226b6d4dea6c00d211d172f95442fcb3198e111585a06f1ddb850beb9082e0424156c104ba4eaea5b157ac7526b6e8aae79203561265e9effb98fdc1b43848ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551719755fa906f820305adbae6605a4
SHA175ee0565083ae8baa3a3bfc323158dfc1038de84
SHA25628881e51880b2d76048a0873d649951b43c942965f5c95e8195417a57a144d33
SHA51219b170d32647115a9c62a534ef85cb63849fb63793f50826bb86705eb7fcc33a81d17e09138efc6c150bf0dfee7b10a2876a7c21e8ba5fae657a4e9dc35b6693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db86eab38d8d3b486bb32d9c43b7577a
SHA100db3f17694f7623140de0d8104c73882cc6f119
SHA256ab6384de35eca21bfa156f7db5811410f104fdc14a9a98399329a534552f02b9
SHA5121502767adb34a9bb7ab1c05f4a9c7d00dde20e803067403e25f2b1f7bb540a9408448dab6a9cca1c00e935e720c244209a15502350f544a2a1a13d0234a0d334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ef564f108f03b4743ccca13ef12303
SHA13b90ee87bc067931a2f3c86cd6fd77eae208d5ec
SHA2563d6fcb9f85fef6bca4421b6935e42a8490fdd9be413e72125de08e9ce8c5c585
SHA51247688b5ad32e4fc3b9fbc09c5ed35bd8a46d713bce2a80c6b995364a6f19b436d699c0b27a8dffc0adc5b42f77183299e85959a9be926b9077033d0618ad6e5d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b